Rename getKey -> getPublicKey (#621)

* rename getKey to getPublicKey

* use publicKey directly in gossipsub

* update error messages
This commit is contained in:
Tanguy Cizain 2021-09-02 12:03:40 +02:00 committed by GitHub
parent 62ca6dd9a0
commit 8cddfde837
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
17 changed files with 55 additions and 59 deletions

View File

@ -303,34 +303,37 @@ proc random*(T: typedesc[KeyPair], rng: var BrHmacDrbgContext,
else: else:
err(SchemeError) err(SchemeError)
proc getKey*(key: PrivateKey): CryptoResult[PublicKey] = proc getPublicKey*(key: PrivateKey): CryptoResult[PublicKey] =
## Get public key from corresponding private key ``key``. ## Get public key from corresponding private key ``key``.
case key.scheme case key.scheme
of PKScheme.RSA: of PKScheme.RSA:
when supported(PKScheme.RSA): when supported(PKScheme.RSA):
let rsakey = key.rsakey.getKey() let rsakey = key.rsakey.getPublicKey()
ok(PublicKey(scheme: RSA, rsakey: rsakey)) ok(PublicKey(scheme: RSA, rsakey: rsakey))
else: else:
err(SchemeError) err(SchemeError)
of PKScheme.Ed25519: of PKScheme.Ed25519:
when supported(PKScheme.Ed25519): when supported(PKScheme.Ed25519):
let edkey = key.edkey.getKey() let edkey = key.edkey.getPublicKey()
ok(PublicKey(scheme: Ed25519, edkey: edkey)) ok(PublicKey(scheme: Ed25519, edkey: edkey))
else: else:
err(SchemeError) err(SchemeError)
of PKScheme.ECDSA: of PKScheme.ECDSA:
when supported(PKScheme.ECDSA): when supported(PKScheme.ECDSA):
let eckey = ? key.eckey.getKey().orError(KeyError) let eckey = ? key.eckey.getPublicKey().orError(KeyError)
ok(PublicKey(scheme: ECDSA, eckey: eckey)) ok(PublicKey(scheme: ECDSA, eckey: eckey))
else: else:
err(SchemeError) err(SchemeError)
of PKScheme.Secp256k1: of PKScheme.Secp256k1:
when supported(PKScheme.Secp256k1): when supported(PKScheme.Secp256k1):
let skkey = key.skkey.getKey() let skkey = key.skkey.getPublicKey()
ok(PublicKey(scheme: Secp256k1, skkey: skkey)) ok(PublicKey(scheme: Secp256k1, skkey: skkey))
else: else:
err(SchemeError) err(SchemeError)
proc getKey*(key: PrivateKey): CryptoResult[PublicKey] {.deprecated: "use getPublicKey".} =
key.getPublicKey()
proc toRawBytes*(key: PrivateKey | PublicKey, proc toRawBytes*(key: PrivateKey | PublicKey,
data: var openarray[byte]): CryptoResult[int] = data: var openarray[byte]): CryptoResult[int] =
## Serialize private key ``key`` (using scheme's own serialization) and store ## Serialize private key ``key`` (using scheme's own serialization) and store

View File

@ -245,7 +245,7 @@ proc random*(
else: else:
ok(res) ok(res)
proc getKey*(seckey: EcPrivateKey): EcResult[EcPublicKey] = proc getPublicKey*(seckey: EcPrivateKey): EcResult[EcPublicKey] =
## Calculate and return EC public key from private key ``seckey``. ## Calculate and return EC public key from private key ``seckey``.
if isNil(seckey): if isNil(seckey):
return err(EcKeyIncorrectError) return err(EcKeyIncorrectError)
@ -272,7 +272,7 @@ proc random*(
## secp521r1). ## secp521r1).
let let
seckey = ? EcPrivateKey.random(kind, rng) seckey = ? EcPrivateKey.random(kind, rng)
pubkey = ? seckey.getKey() pubkey = ? seckey.getPublicKey()
key = EcKeyPair(seckey: seckey, pubkey: pubkey) key = EcKeyPair(seckey: seckey, pubkey: pubkey)
ok(key) ok(key)
@ -368,7 +368,7 @@ proc toBytes*(seckey: EcPrivateKey, data: var openarray[byte]): EcResult[int] =
return err(EcKeyIncorrectError) return err(EcKeyIncorrectError)
if seckey.key.curve in EcSupportedCurvesCint: if seckey.key.curve in EcSupportedCurvesCint:
var offset, length: int var offset, length: int
var pubkey = ? seckey.getKey() var pubkey = ? seckey.getPublicKey()
var b = Asn1Buffer.init() var b = Asn1Buffer.init()
var p = Asn1Composite.init(Asn1Tag.Sequence) var p = Asn1Composite.init(Asn1Tag.Sequence)
var c0 = Asn1Composite.init(0) var c0 = Asn1Composite.init(0)

View File

@ -1682,7 +1682,7 @@ proc random*(t: typedesc[EdKeyPair], rng: var BrHmacDrbgContext): EdKeyPair =
res res
proc getKey*(key: EdPrivateKey): EdPublicKey = proc getPublicKey*(key: EdPrivateKey): EdPublicKey =
## Calculate and return ED25519 public key from private key ``key``. ## Calculate and return ED25519 public key from private key ``key``.
copyMem(addr result.data[0], unsafeAddr key.data[32], 32) copyMem(addr result.data[0], unsafeAddr key.data[32], 32)

View File

@ -225,7 +225,7 @@ proc copy*[T: RsaPKI](key: T): T =
result = new RsaSignature result = new RsaSignature
result.buffer = key.buffer result.buffer = key.buffer
proc getKey*(key: RsaPrivateKey): RsaPublicKey = proc getPublicKey*(key: RsaPrivateKey): RsaPublicKey =
## Get RSA public key from RSA private key. ## Get RSA public key from RSA private key.
doAssert(not isNil(key)) doAssert(not isNil(key))
let length = key.pubk.nlen + key.pubk.elen let length = key.pubk.nlen + key.pubk.elen
@ -245,7 +245,7 @@ proc seckey*(pair: RsaKeyPair): RsaPrivateKey {.inline.} =
proc pubkey*(pair: RsaKeyPair): RsaPublicKey {.inline.} = proc pubkey*(pair: RsaKeyPair): RsaPublicKey {.inline.} =
## Get RSA public key from pair ``pair``. ## Get RSA public key from pair ``pair``.
result = cast[RsaPrivateKey](pair).getKey() result = cast[RsaPrivateKey](pair).getPublicKey()
proc clear*[T: RsaPKI|RsaKeyPair](pki: var T) = proc clear*[T: RsaPKI|RsaKeyPair](pki: var T) =
## Wipe and clear EC private key, public key or scalar object. ## Wipe and clear EC private key, public key or scalar object.

View File

@ -141,7 +141,7 @@ proc init*(t: typedesc[SkSignature], data: string): SkResult[SkSignature] =
var sig: SkSignature var sig: SkSignature
sig.init(data) and ok(sig) sig.init(data) and ok(sig)
proc getKey*(key: SkPrivateKey): SkPublicKey = proc getPublicKey*(key: SkPrivateKey): SkPublicKey =
## Calculate and return Secp256k1 `public key` from `private key` ``key``. ## Calculate and return Secp256k1 `public key` from `private key` ``key``.
SkPublicKey(SkSecretKey(key).toPublicKey()) SkPublicKey(SkSecretKey(key).toPublicKey())
@ -211,4 +211,4 @@ proc `$`*(key: SkKeyPair): string {.borrow.}
proc `==`*(a, b: SkPrivateKey): bool {.borrow.} proc `==`*(a, b: SkPrivateKey): bool {.borrow.}
proc `==`*(a, b: SkPublicKey): bool {.borrow.} proc `==`*(a, b: SkPublicKey): bool {.borrow.}
proc `==`*(a, b: SkSignature): bool {.borrow.} proc `==`*(a, b: SkSignature): bool {.borrow.}
proc `==`*(a, b: SkKeyPair): bool {.borrow.} proc `==`*(a, b: SkKeyPair): bool {.borrow.}

View File

@ -172,7 +172,7 @@ func init*(t: typedesc[PeerID], pubkey: PublicKey): Result[PeerID, cstring] =
func init*(t: typedesc[PeerID], seckey: PrivateKey): Result[PeerID, cstring] = func init*(t: typedesc[PeerID], seckey: PrivateKey): Result[PeerID, cstring] =
## Create new peer id from private key ``seckey``. ## Create new peer id from private key ``seckey``.
PeerID.init(? seckey.getKey().orError(cstring("invalid private key"))) PeerID.init(? seckey.getPublicKey().orError(cstring("invalid private key")))
func match*(pid: PeerID, pubkey: PublicKey): bool = func match*(pid: PeerID, pubkey: PublicKey): bool =
## Returns ``true`` if ``pid`` matches public key ``pubkey``. ## Returns ``true`` if ``pid`` matches public key ``pubkey``.

View File

@ -143,7 +143,7 @@ proc publicKey*(p: PeerInfo): Option[PublicKey] =
elif p.key.isSome: elif p.key.isSome:
res = p.key res = p.key
else: else:
let pkeyRes = p.privateKey.getKey() let pkeyRes = p.privateKey.getPublicKey()
if pkeyRes.isOk: if pkeyRes.isOk:
res = some(pkeyRes.get()) res = some(pkeyRes.get())

View File

@ -81,11 +81,8 @@ proc init*(
raise (ref LPError)(msg: "Cannot sign message without private key") raise (ref LPError)(msg: "Cannot sign message without private key")
msg.signature = sign(msg, peer.privateKey).expect("Couldn't sign message!") msg.signature = sign(msg, peer.privateKey).expect("Couldn't sign message!")
msg.key = peer.privateKey msg.key = peer.privateKey.getPublicKey().expect("Invalid private key!")
.getKey() .getBytes().expect("Couldn't get public key bytes!")
.expect("Expected a Private Key!")
.getBytes()
.expect("Couldn't get Private Key bytes!")
elif sign: elif sign:
raise (ref LPError)(msg: "Cannot sign message without peer info") raise (ref LPError)(msg: "Cannot sign message without peer info")

View File

@ -602,11 +602,9 @@ proc new*(
outgoing: bool = true, outgoing: bool = true,
commonPrologue: seq[byte] = @[]): T = commonPrologue: seq[byte] = @[]): T =
let pkBytes = privateKey let pkBytes = privateKey.getPublicKey()
.getKey()
.expect("Expected valid Private Key") .expect("Expected valid Private Key")
.getBytes() .getBytes().expect("Couldn't get public Key bytes")
.expect("Couldn't get Private Key bytes")
var noise = Noise( var noise = Noise(
rng: rng, rng: rng,

View File

@ -435,16 +435,14 @@ proc new*(
T: typedesc[Secio], T: typedesc[Secio],
rng: ref BrHmacDrbgContext, rng: ref BrHmacDrbgContext,
localPrivateKey: PrivateKey): T = localPrivateKey: PrivateKey): T =
let pkRes = localPrivateKey.getKey() let pkRes = localPrivateKey.getPublicKey()
if pkRes.isErr: if pkRes.isErr:
raise newException(Defect, "Can't fetch local private key") raise newException(Defect, "Invalid private key")
let secio = Secio( let secio = Secio(
rng: rng, rng: rng,
localPrivateKey: localPrivateKey, localPrivateKey: localPrivateKey,
localPublicKey: localPrivateKey localPublicKey: pkRes.get(),
.getKey()
.expect("Can't fetch local private key"),
) )
secio.init() secio.init()
secio secio

View File

@ -372,7 +372,7 @@ suite "Key interface test suite":
for i in 0..<len(PrivateKeys): for i in 0..<len(PrivateKeys):
var seckey = PrivateKey.init(fromHex(stripSpaces(PrivateKeys[i]))).expect("private key") var seckey = PrivateKey.init(fromHex(stripSpaces(PrivateKeys[i]))).expect("private key")
var pubkey = PublicKey.init(fromHex(stripSpaces(PublicKeys[i]))).expect("public key") var pubkey = PublicKey.init(fromHex(stripSpaces(PublicKeys[i]))).expect("public key")
var calckey = seckey.getKey().expect("public key") var calckey = seckey.getPublicKey().expect("public key")
check: check:
pubkey == calckey pubkey == calckey
var checkseckey = seckey.getBytes().expect("private key") var checkseckey = seckey.getBytes().expect("private key")
@ -387,7 +387,7 @@ suite "Key interface test suite":
for i in 0..<5: for i in 0..<5:
var seckey = PrivateKey.random(ECDSA, rng[]).get() var seckey = PrivateKey.random(ECDSA, rng[]).get()
var pubkey = seckey.getKey().get() var pubkey = seckey.getPublicKey().get()
var pair = KeyPair.random(ECDSA, rng[]).get() var pair = KeyPair.random(ECDSA, rng[]).get()
var sig1 = pair.seckey.sign(bmsg).get() var sig1 = pair.seckey.sign(bmsg).get()
var sig2 = seckey.sign(bmsg).get() var sig2 = seckey.sign(bmsg).get()
@ -407,7 +407,7 @@ suite "Key interface test suite":
for i in 0..<5: for i in 0..<5:
var seckey = PrivateKey.random(Ed25519, rng[]).get() var seckey = PrivateKey.random(Ed25519, rng[]).get()
var pubkey = seckey.getKey().get() var pubkey = seckey.getPublicKey().get()
var pair = KeyPair.random(Ed25519, rng[]).get() var pair = KeyPair.random(Ed25519, rng[]).get()
var sig1 = pair.seckey.sign(bmsg).get() var sig1 = pair.seckey.sign(bmsg).get()
var sig2 = seckey.sign(bmsg).get() var sig2 = seckey.sign(bmsg).get()
@ -427,7 +427,7 @@ suite "Key interface test suite":
for i in 0 ..< 2: for i in 0 ..< 2:
var seckey = PrivateKey.random(RSA, rng[], 2048).get() var seckey = PrivateKey.random(RSA, rng[], 2048).get()
var pubkey = seckey.getKey().get() var pubkey = seckey.getPublicKey().get()
var pair = KeyPair.random(RSA, rng[], 2048).get() var pair = KeyPair.random(RSA, rng[], 2048).get()
var sig1 = pair.seckey.sign(bmsg).get() var sig1 = pair.seckey.sign(bmsg).get()
var sig2 = seckey.sign(bmsg).get() var sig2 = seckey.sign(bmsg).get()

View File

@ -351,8 +351,8 @@ suite "EC NIST-P256/384/521 test suite":
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1])) var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
var seckey1 = EcPrivateKey.initRaw(key1).expect("initRaw key") var seckey1 = EcPrivateKey.initRaw(key1).expect("initRaw key")
var seckey2 = EcPrivateKey.initRaw(key2).expect("initRaw key") var seckey2 = EcPrivateKey.initRaw(key2).expect("initRaw key")
var pubkey1 = seckey1.getKey().expect("public key") var pubkey1 = seckey1.getPublicKey().expect("public key")
var pubkey2 = seckey2.getKey().expect("public key") var pubkey2 = seckey2.getPublicKey().expect("public key")
var secret1 = getSecret(pubkey2, seckey1) var secret1 = getSecret(pubkey2, seckey1)
var secret2 = getSecret(pubkey1, seckey2) var secret2 = getSecret(pubkey1, seckey2)
var expsecret = fromHex(stripSpaces(ECDHESecrets[i])) var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
@ -364,7 +364,7 @@ suite "EC NIST-P256/384/521 test suite":
for i in 0..<2: for i in 0..<2:
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key") var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("private key") var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("private key")
var checkpk = sk.getKey().expect("public key") var checkpk = sk.getPublicKey().expect("public key")
check expectpk == checkpk check expectpk == checkpk
var checksig = sk.sign(SignatureMessages[i]).expect("signature") var checksig = sk.sign(SignatureMessages[i]).expect("signature")
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature") var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
@ -378,7 +378,7 @@ suite "EC NIST-P256/384/521 test suite":
test "[secp256r1] ECDSA non-deterministic test vectors": test "[secp256r1] ECDSA non-deterministic test vectors":
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[0])).expect("private key") var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[0])).expect("private key")
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[0])).expect("public key") var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[0])).expect("public key")
var checkpk = sk.getKey().expect("public key") var checkpk = sk.getPublicKey().expect("public key")
check pk == checkpk check pk == checkpk
for i in 0..<6: for i in 0..<6:
var message = NDMessages[i] var message = NDMessages[i]
@ -458,8 +458,8 @@ suite "EC NIST-P256/384/521 test suite":
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1])) var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
var seckey1 = EcPrivateKey.initRaw(key1).expect("private key") var seckey1 = EcPrivateKey.initRaw(key1).expect("private key")
var seckey2 = EcPrivateKey.initRaw(key2).expect("private key") var seckey2 = EcPrivateKey.initRaw(key2).expect("private key")
var pubkey1 = seckey1.getKey().expect("public key") var pubkey1 = seckey1.getPublicKey().expect("public key")
var pubkey2 = seckey2.getKey().expect("public key") var pubkey2 = seckey2.getPublicKey().expect("public key")
var secret1 = getSecret(pubkey2, seckey1) var secret1 = getSecret(pubkey2, seckey1)
var secret2 = getSecret(pubkey1, seckey2) var secret2 = getSecret(pubkey1, seckey2)
var expsecret = fromHex(stripSpaces(ECDHESecrets[i])) var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
@ -471,7 +471,7 @@ suite "EC NIST-P256/384/521 test suite":
for i in 2..<4: for i in 2..<4:
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key") var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("public key") var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("public key")
var checkpk = sk.getKey().expect("public key") var checkpk = sk.getPublicKey().expect("public key")
check expectpk == checkpk check expectpk == checkpk
var checksig = sk.sign(SignatureMessages[i]).expect("signature") var checksig = sk.sign(SignatureMessages[i]).expect("signature")
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature") var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
@ -485,7 +485,7 @@ suite "EC NIST-P256/384/521 test suite":
test "[secp384r1] ECDSA non-deterministic test vectors": test "[secp384r1] ECDSA non-deterministic test vectors":
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[1])).expect("private key") var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[1])).expect("private key")
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[1])).expect("public key") var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[1])).expect("public key")
var checkpk = sk.getKey().expect("public key") var checkpk = sk.getPublicKey().expect("public key")
check pk == checkpk check pk == checkpk
for i in 6..<12: for i in 6..<12:
var message = NDMessages[i] var message = NDMessages[i]
@ -565,8 +565,8 @@ suite "EC NIST-P256/384/521 test suite":
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1])) var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
var seckey1 = EcPrivateKey.initRaw(key1).expect("private key") var seckey1 = EcPrivateKey.initRaw(key1).expect("private key")
var seckey2 = EcPrivateKey.initRaw(key2).expect("private key") var seckey2 = EcPrivateKey.initRaw(key2).expect("private key")
var pubkey1 = seckey1.getKey().expect("public key") var pubkey1 = seckey1.getPublicKey().expect("public key")
var pubkey2 = seckey2.getKey().expect("public key") var pubkey2 = seckey2.getPublicKey().expect("public key")
var secret1 = getSecret(pubkey2, seckey1) var secret1 = getSecret(pubkey2, seckey1)
var secret2 = getSecret(pubkey1, seckey2) var secret2 = getSecret(pubkey1, seckey2)
var expsecret = fromHex(stripSpaces(ECDHESecrets[i])) var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
@ -578,7 +578,7 @@ suite "EC NIST-P256/384/521 test suite":
for i in 4..<6: for i in 4..<6:
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key") var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("public key") var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("public key")
var checkpk = sk.getKey().expect("public key") var checkpk = sk.getPublicKey().expect("public key")
check expectpk == checkpk check expectpk == checkpk
var checksig = sk.sign(SignatureMessages[i]).expect("signature") var checksig = sk.sign(SignatureMessages[i]).expect("signature")
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature") var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
@ -592,7 +592,7 @@ suite "EC NIST-P256/384/521 test suite":
test "[secp521r1] ECDSA non-deterministic test vectors": test "[secp521r1] ECDSA non-deterministic test vectors":
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[2])).expect("private key") var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[2])).expect("private key")
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[2])).expect("public key") var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[2])).expect("public key")
var checkpk = sk.getKey().expect("public key") var checkpk = sk.getPublicKey().expect("public key")
check pk == checkpk check pk == checkpk
for i in 12..<18: for i in 12..<18:
var message = NDMessages[i] var message = NDMessages[i]

View File

@ -161,7 +161,7 @@ suite "Ed25519 test suite":
for i in 0..<5: for i in 0..<5:
var key = EdPrivateKey.init(stripSpaces(SecretKeys[i])).expect("key/sig") var key = EdPrivateKey.init(stripSpaces(SecretKeys[i])).expect("key/sig")
var exppub = EdPublicKey.init(stripSpaces(PublicKeys[i])).expect("key/sig") var exppub = EdPublicKey.init(stripSpaces(PublicKeys[i])).expect("key/sig")
var pubkey = key.getKey() var pubkey = key.getPublicKey()
check pubkey == exppub check pubkey == exppub
var msg = fromHex(stripSpaces(Messages[i])) var msg = fromHex(stripSpaces(Messages[i]))
var sig = key.sign(msg) var sig = key.sign(msg)

View File

@ -70,7 +70,7 @@ suite "Identify":
discard await msDial.select(conn, IdentifyCodec) discard await msDial.select(conn, IdentifyCodec)
let id = await identifyProto2.identify(conn, remotePeerInfo) let id = await identifyProto2.identify(conn, remotePeerInfo)
check id.pubKey.get() == remoteSecKey.getKey().get() check id.pubKey.get() == remoteSecKey.getPublicKey().get()
check id.addrs[0] == ma check id.addrs[0] == ma
check id.protoVersion.get() == ProtoVersion check id.protoVersion.get() == ProtoVersion
check id.agentVersion.get() == AgentVersion check id.agentVersion.get() == AgentVersion
@ -93,7 +93,7 @@ suite "Identify":
discard await msDial.select(conn, IdentifyCodec) discard await msDial.select(conn, IdentifyCodec)
let id = await identifyProto2.identify(conn, remotePeerInfo) let id = await identifyProto2.identify(conn, remotePeerInfo)
check id.pubKey.get() == remoteSecKey.getKey().get() check id.pubKey.get() == remoteSecKey.getPublicKey().get()
check id.addrs[0] == ma check id.addrs[0] == ma
check id.protoVersion.get() == ProtoVersion check id.protoVersion.get() == ProtoVersion
check id.agentVersion.get() == customAgentVersion check id.agentVersion.get() == customAgentVersion

View File

@ -183,7 +183,7 @@ suite "Peer testing suite":
test "Go PeerID test vectors": test "Go PeerID test vectors":
for i in 0..<len(PrivateKeys): for i in 0..<len(PrivateKeys):
var seckey = PrivateKey.init(stripSpaces(PrivateKeys[i])).get() var seckey = PrivateKey.init(stripSpaces(PrivateKeys[i])).get()
var pubkey = seckey.getKey().get() var pubkey = seckey.getPublicKey().get()
var p1 = PeerID.init(seckey).get() var p1 = PeerID.init(seckey).get()
var p2 = PeerID.init(pubkey).get() var p2 = PeerID.init(pubkey).get()
var p3 = PeerID.init(PeerIDs[i]).get() var p3 = PeerID.init(PeerIDs[i]).get()

View File

@ -16,23 +16,23 @@ suite "PeerInfo":
check peerId == peerInfo.peerId check peerId == peerInfo.peerId
check seckey == peerInfo.privateKey check seckey == peerInfo.privateKey
check seckey.getKey().get() == peerInfo.publicKey.get() check seckey.getPublicKey().get() == peerInfo.publicKey.get()
test "Should init with public key": test "Should init with public key":
let seckey = PrivateKey.random(ECDSA, rng[]).get() let seckey = PrivateKey.random(ECDSA, rng[]).get()
var peerInfo = PeerInfo.init(seckey.getKey().get()) var peerInfo = PeerInfo.init(seckey.getPublicKey().get())
var peerId = PeerID.init(seckey.getKey().get()).get() var peerId = PeerID.init(seckey.getPublicKey().get()).get()
check peerId == peerInfo.peerId check peerId == peerInfo.peerId
check seckey.getKey.get() == peerInfo.publicKey.get() check seckey.getPublicKey.get() == peerInfo.publicKey.get()
test "Should init from PeerId with public key": test "Should init from PeerId with public key":
let seckey = PrivateKey.random(Ed25519, rng[]).get() let seckey = PrivateKey.random(Ed25519, rng[]).get()
var peerInfo = PeerInfo.init(PeerID.init(seckey.getKey.get()).get()) var peerInfo = PeerInfo.init(PeerID.init(seckey.getPublicKey.get()).get())
var peerId = PeerID.init(seckey.getKey.get()).get() var peerId = PeerID.init(seckey.getPublicKey.get()).get()
check peerId == peerInfo.peerId check peerId == peerInfo.peerId
check seckey.getKey.get() == peerInfo.publicKey.get() check seckey.getPublicKey.get() == peerInfo.publicKey.get()
test "Should init from CIDv0 string": test "Should init from CIDv0 string":
var peerInfo: PeerInfo var peerInfo: PeerInfo

View File

@ -524,7 +524,7 @@ suite "RSA 2048/3072/4096 test suite":
var pubkey = RsaPublicKey.init(pubser).expect("key initialization") var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
check: check:
seckey.getBytes().expect("bytes") == prvser seckey.getBytes().expect("bytes") == prvser
var cpubkey = seckey.getKey() var cpubkey = seckey.getPublicKey()
check: check:
pubkey == cpubkey pubkey == cpubkey
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes") pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")
@ -547,7 +547,7 @@ suite "RSA 2048/3072/4096 test suite":
var pubkey = RsaPublicKey.init(pubser).expect("key initialization") var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
check: check:
seckey.getBytes().expect("bytes") == prvser seckey.getBytes().expect("bytes") == prvser
var cpubkey = seckey.getKey() var cpubkey = seckey.getPublicKey()
check: check:
pubkey == cpubkey pubkey == cpubkey
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes") pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")
@ -570,7 +570,7 @@ suite "RSA 2048/3072/4096 test suite":
var pubkey = RsaPublicKey.init(pubser).expect("key initialization") var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
check: check:
seckey.getBytes().expect("bytes") == prvser seckey.getBytes().expect("bytes") == prvser
var cpubkey = seckey.getKey() var cpubkey = seckey.getPublicKey()
check: check:
pubkey == cpubkey pubkey == cpubkey
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes") pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")